322 patents
Page 5 of 17
Utility
Dynamic Establishment and Termination of VPN Tunnels Between Spokes
20 Apr 23
To reduce overhead generated by maintaining a full mesh network with static spoke-to-spoke tunnels while providing the efficiency of spoke-to-spoke communication, BGP configuration is automated to provide for dynamic establishment of spoke-to-spoke tunnels.
Li Meng, Dhwanit Shah
Filed: 20 Dec 22
Utility
Localization at Scale for a Cloud-based Security Service
13 Apr 23
Techniques for providing localization at scale for a cloud-based security service are disclosed.
Thomas Arthur Warburton, Shu Lin, Devendra Raut, Jialiang Li, Hao Long
Filed: 14 Dec 22
Utility
Intelligent Deployment Region Selection and Scaling of Cloud-based Firewalls
6 Apr 23
Automated, intelligent selection of regions for cloud-based firewall deployment and scaling of firewalls down to as few as zero in a cloud region is described herein.
Bhaskar Bhupalam, Gino John
Filed: 4 Oct 21
Utility
Key-value Storage for Url Categorization
6 Apr 23
A URL and a categorization associated with the URL are received.
Wei Cao, Dao-Chen Zheng
Filed: 30 Nov 22
Utility
Access Point Name and Application Identity Based Security Enforcement In Service Provider Networks
6 Apr 23
Techniques for access point name and application identity based security enforcement in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed.
Sachin Verma, Leonid Burakovsky
Filed: 9 Dec 22
Utility
Iot Security Event Correlation
30 Mar 23
Correlating Internet of Things (IoT) security events is disclosed.
Jun Du
Filed: 30 Sep 21
Utility
Packet Loss Based Real-time Network Path Health Scoring
30 Mar 23
The disclosed scoring uses a “dynamic packet loss threshold” that is based on benchmarks of “good” packet loss behavior of network paths associated with circuits of different bandwidths and recent behavior of the path being scored.
Gopal Gadekal Reddy
Filed: 11 Jul 22
Utility
Network Path Health Scoring Based on Load Binned Latency Data
30 Mar 23
A network path scoring system is disclosed herein that scores quality of network paths to facilitate identification of poorly performing network paths or circuits for investigation.
Gopal Gadekal Reddy
Filed: 11 Jul 22
Utility
Latency Based Network Path Scoring
23 Mar 23
A network path scoring system is disclosed herein that scores “health” of network paths based on latency data.
Gopal Gadekal Reddy
Filed: 11 Jul 22
Utility
Label Guided Unsupervised Learning Based Network-level Application Signature Generation
23 Mar 23
Application-initiated network traffic is intercepted and analyzed by an application firewall in order to identify streams of traffic for a target application.
Stefan Achleitner
Filed: 31 Oct 22
Utility
Dynamic Path Selection and Data Flow Forwarding
23 Mar 23
Various techniques for dynamic path selection and data flow forwarding are disclosed.
Kumar Ramachandran, Venkataraman Anand, Navneet Yadav, Arivu Ramasamy, Aaron Edwards, Gopal Reddy
Filed: 6 Oct 22
Utility
Multi-ssid Hidden Wireless Network
23 Mar 23
An access point provides a hidden wireless network that is configured with a set of SSIDs so that the hidden network is discoverable with multiple different SSIDs.
Ta Chien Lin
Filed: 21 Sep 21
Utility
Capacity Agnostic Scoring of Network Path Health Based on Packet Loss
23 Mar 23
A network path scoring system is disclosed herein that scores quality of network paths to facilitate identification of poorly performing circuits for investigation.
Gopal Gadekal Reddy
Filed: 11 Jul 22
Utility
Causality Detection for Outlier Events In Telemetry Metric Data
16 Mar 23
Identifying causal relationships between outlier telemetry events in telemetry metric data using machine learning ensembles of an autoencoder and an attention mechanism provides an automated framework for root cause analysis.
Zhen Han Si, Claudionor Jose Nunes Coelho, JR., Viswesh Ananthakrishnan, Eyal Firstenberg
Filed: 13 Sep 21
Utility
Preventing Ransomware from Encrypting Files on a Target Machine
16 Mar 23
Techniques for preventing ransomware from encrypting files on a target machine are disclosed.
Eldar Aharoni, Vadim Goldstein, Mashav Sapir, Jenny Kitaichik
Filed: 17 Nov 22
Utility
Dynamic Analysis Techniques for Applications
16 Mar 23
A sample is analyzed to determine a set of events that should be selected for performing by a dynamic analyzer executing the sample in an instrumented, emulated environment.
Cong Zheng, Wenjun Hu, Zhi Xu
Filed: 21 Nov 22
Utility
Automated Fuzzy Hash Based Signature Collecting System for Malware Detection
16 Mar 23
Automated fuzzy hash based signature collection is disclosed.
Yang Ji, Wenjun Hu, Xiao Zhang
Filed: 10 Sep 21
Utility
Supporting Zone-based Policy Enforcement for a Firewall Connected to a One-arm Load Balancer
16 Mar 23
A virtual firewall configured with two interfaces assigned different security zones switches between Layer 3 routing and bump-in-the-wire (BITW) modes between sessions.
Charles Bransi, Steven Alsop
Filed: 16 Sep 21
Utility
Private Cloud Control
16 Mar 23
Management of IoT devices through a private cloud.
Xu Zou, Jianlin Zeng, Mei Wang
Filed: 17 Nov 22
Utility
Distributed Cardinality Optimization
16 Mar 23
A cardinality query associated with a specific attribute is received.
Fan Zhang, Ran Xia
Filed: 21 Oct 22